Case Analysis on Cyber Conflict The continuous cyberwar among Iran and Israel has seen the two countries participate ina progression of secret digital tasks coordinated focusing on one another’s tactical capacities,lawful structures, and central foundation. Israel has sent off various activities against Iranutilizing its high level computerized abilities, for the most part pointed toward disturbing…
Author: elomb002
Reflective Writing Assignment
Throughout the entire spring semester, this class has exposed me to a variety of topics within the cyber world and the diverse perspectives people hold on these issues. It has broadened my understanding of the nuanced ways in which different individuals approach cyber topics, and helped me appreciate the underlying reasons for their viewpoints. This…
Journal Entry’s
Journal Entry #1 Q: Review the NICE Workforce Framework. Are there certain areas thatyou would want to focus your career on? A: After reviewing the NICE Workforce Framework, there was one that caught my eye. The one that caught my eye is viruses. I wound want to focus on viruses because it is a problem…
Career paper
There are many chances, occupations, and career pathways you can follow in the field ofcyber security that cyber security can provide for you. A good example of one career path thatcyber security can give you is a Penetration tester. A Penetration tester is a job where anindividual looks for exploits, holes, vulnerabilities, and weaknesses in…
Article 2 Review
Today I will be reviewing the article “Is there a cyber security dilemma? ” by Carly EBeckerman. This article goes over the rise of cyber attacks and tries to fully understand cyberattacks. As governments are trying to understand cyber attacks and battle cyber attacks. Cyberattacks are still on the rise and wreaking havoc in the…
Article 1 review
Today I will be reviewing “Cyberattacks, cyber threats, and attitudes towardcybersecurity policies” by Keren L G Snider, Ryan Shandler, Shay Zandani, Daphna Canetti.Since the rise in technology and computers the accessibility of computers and the world wideweb has been at an all time high. Anyone from young to old can now access the world wide…
The Human Factor in Cybersecurity
After reading this weeks reading it gave me a better understanding on how we should approach the development of cyber policy and infrastructure. As technology seems to advance innovate, and grow as time progresses, and there is no sign of stoping any time soon. As it grows the cybersecurity field will adapt and grow hand…
Protecting Availability
Say That I am A CISO for a company. There are many protection I could use and implement to ensure availability of my system. There is a few I would implement. One, is I will try to see if there are any open points in the software or firewall because with those open point the…
SCADA Systems
The Critical infrastructure systems is a great asset to have in your job and workspace. Although the critical infrastructure system is a great system. It has its downsides and vulnerabilities in the system. But that is what the SCADA system is for. It is used to enforce the safety of the Critical infrastructure systems downsides…